Abstract—Bipartite graphs can model many real life appli-cations including users-rating-products in online marketplaces, users-clicking-webpages on the World Wide Web and users-referring-users in social networks. In these graphs, the anoma-lousness of nodes in one partite often depends on that of their connected nodes in the other partite. Previous studies have shown that this dependency can be positive (the anomalousness of a node in one partite increases or decreases along with that of its connected nodes in the other partite) or negative (the anomalousness of a node in one partite rises or falls in opposite direction to that of its connected nodes in the other partite). In this paper, we unify both positive and negative mutual dependency...
Anomaly detection is becoming an important problem in graph mining. This is because people are eager...
Anomaly detection on graphs plays a significant role in various domains, including cybersecurity, e-...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
Abstract—Bipartite graphs can model many real life appli-cations including users-rating-products in ...
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P syste...
Many social economic systems can be represented as attributed networks encoding the relations betwee...
Many social and economic systems can be represented as attributed networks encoding the relations be...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P syste...
Knowledge discovery from disparate data sources can be very useful for gaining a better understandin...
The ability to mine data represented as a graph has become important in several domains for detectin...
AbstractDetection of different kinds of anomalous behaviors originating from negative ties among act...
UnrestrictedAn important research problem in knowledge discovery and data mining is to identify abno...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
Anomaly detection is becoming an important problem in graph mining. This is because people are eager...
Anomaly detection on graphs plays a significant role in various domains, including cybersecurity, e-...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
Abstract—Bipartite graphs can model many real life appli-cations including users-rating-products in ...
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P syste...
Many social economic systems can be represented as attributed networks encoding the relations betwee...
Many social and economic systems can be represented as attributed networks encoding the relations be...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P syste...
Knowledge discovery from disparate data sources can be very useful for gaining a better understandin...
The ability to mine data represented as a graph has become important in several domains for detectin...
AbstractDetection of different kinds of anomalous behaviors originating from negative ties among act...
UnrestrictedAn important research problem in knowledge discovery and data mining is to identify abno...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
Anomaly detection is becoming an important problem in graph mining. This is because people are eager...
Anomaly detection on graphs plays a significant role in various domains, including cybersecurity, e-...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...